I am totally excited about the awesome speaker lineup for this event. I am thankful for the opportunity to present at SQL Saturday #203 in downtown Boston.
The presentation slides as well as T-SQL code is enclosed below for your review. I hope you have time to attend cool event on April 6th, 2013!
How to audit and prevent unwanted user actions
Typical corporations are composed of small departments located in different countries and time zones. Adding offshore resources and vendors to the mix make the coordination IT efforts more complicated.
While you might be the lead DBA for your corporation, other people have keys to the kingdom, change control process is usually weak, and the SDLC process might not be well structured. This can be a recipe for disaster.
How do you prevent and audit unwanted user actions to key data?
This presentation will review the following techniques to fix your woes.
1 – Granting correct user access is vital.
2 – DML triggers to keep a DATA audit trail.
3 – DDL triggers to keep a SCHEMA audit trail.
4 – Preventing unwanted DATA modifications.
5 – Preventing unwanted SCHEMA changes.
6 – Preventing table TRUNCATIONS.
7 – LOGIN triggers to control who, what, and when.
8 – Change data capture (CDC) an alternative to triggers.